939 resultados para Continuously Stirred Bioreactor
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.
Resumo:
Objectives This study evaluated the heat strain experienced by armored vehicle officers (AVOs) wearing personal body armor (PBA) in a sub-tropical climate. Methods Twelve male AVOs, aged 35-58 years, undertook an eight hour shift while wearing PBA. Heart rate and core temperature were monitored continuously. Urine specific gravity (USG) was measured before and after, and with any urination during the shift. Results Heart rate indicated an intermittent and low-intensity nature of the work. USG revealed six AVOs were dehydrated from pre through post shift, and two others became dehydrated. Core temperature averaged 37.4 ± 0.3°C, with maximum's of 37.7 ± 0.2°C. Conclusions Despite increased age, body mass, and poor hydration practices, and Wet-Bulb Globe Temperatures in excess of 30°C; the intermittent nature and low intensity of the work prevented excessive heat strain from developing.
Resumo:
Barmah Forest virus (BFV) disease is one of the most widespread mosquito-borne diseases in Australia. The number of outbreaks and the incidence rate of BFV in Australia have attracted growing concerns about the spatio-temporal complexity and underlying risk factors of BFV disease. A large number of notifications has been recorded continuously in Queensland since 1992. Yet, little is known about the spatial and temporal characteristics of the disease. I aim to use notification data to better understand the effects of climatic, demographic, socio-economic and ecological risk factors on the spatial epidemiology of BFV disease transmission, develop predictive risk models and forecast future disease risks under climate change scenarios. Computerised data files of daily notifications of BFV disease and climatic variables in Queensland during 1992-2008 were obtained from Queensland Health and Australian Bureau of Meteorology, respectively. Projections on climate data for years 2025, 2050 and 2100 were obtained from Council of Scientific Industrial Research Organisation. Data on socio-economic, demographic and ecological factors were also obtained from relevant government departments as follows: 1) socio-economic and demographic data from Australian Bureau of Statistics; 2) wetlands data from Department of Environment and Resource Management and 3) tidal readings from Queensland Department of Transport and Main roads. Disease notifications were geocoded and spatial and temporal patterns of disease were investigated using geostatistics. Visualisation of BFV disease incidence rates through mapping reveals the presence of substantial spatio-temporal variation at statistical local areas (SLA) over time. Results reveal high incidence rates of BFV disease along coastal areas compared to the whole area of Queensland. A Mantel-Haenszel Chi-square analysis for trend reveals a statistically significant relationship between BFV disease incidence rates and age groups (ƒÓ2 = 7587, p<0.01). Semi-variogram analysis and smoothed maps created from interpolation techniques indicate that the pattern of spatial autocorrelation was not homogeneous across the state. A cluster analysis was used to detect the hot spots/clusters of BFV disease at a SLA level. Most likely spatial and space-time clusters are detected at the same locations across coastal Queensland (p<0.05). The study demonstrates heterogeneity of disease risk at a SLA level and reveals the spatial and temporal clustering of BFV disease in Queensland. Discriminant analysis was employed to establish a link between wetland classes, climate zones and BFV disease. This is because the importance of wetlands in the transmission of BFV disease remains unclear. The multivariable discriminant modelling analyses demonstrate that wetland types of saline 1, riverine and saline tidal influence were the most significant risk factors for BFV disease in all climate and buffer zones, while lacustrine, palustrine, estuarine and saline 2 and saline 3 wetlands were less important. The model accuracies were 76%, 98% and 100% for BFV risk in subtropical, tropical and temperate climate zones, respectively. This study demonstrates that BFV disease risk varied with wetland class and climate zone. The study suggests that wetlands may act as potential breeding habitats for BFV vectors. Multivariable spatial regression models were applied to assess the impact of spatial climatic, socio-economic and tidal factors on the BFV disease in Queensland. Spatial regression models were developed to account for spatial effects. Spatial regression models generated superior estimates over a traditional regression model. In the spatial regression models, BFV disease incidence shows an inverse relationship with minimum temperature, low tide and distance to coast, and positive relationship with rainfall in coastal areas whereas in whole Queensland the disease shows an inverse relationship with minimum temperature and high tide and positive relationship with rainfall. This study determines the most significant spatial risk factors for BFV disease across Queensland. Empirical models were developed to forecast the future risk of BFV disease outbreaks in coastal Queensland using existing climatic, socio-economic and tidal conditions under climate change scenarios. Logistic regression models were developed using BFV disease outbreak data for the existing period (2000-2008). The most parsimonious model had high sensitivity, specificity and accuracy and this model was used to estimate and forecast BFV disease outbreaks for years 2025, 2050 and 2100 under climate change scenarios for Australia. Important contributions arising from this research are that: (i) it is innovative to identify high-risk coastal areas by creating buffers based on grid-centroid and the use of fine-grained spatial units, i.e., mesh blocks; (ii) a spatial regression method was used to account for spatial dependence and heterogeneity of data in the study area; (iii) it determined a range of potential spatial risk factors for BFV disease; and (iv) it predicted the future risk of BFV disease outbreaks under climate change scenarios in Queensland, Australia. In conclusion, the thesis demonstrates that the distribution of BFV disease exhibits a distinct spatial and temporal variation. Such variation is influenced by a range of spatial risk factors including climatic, demographic, socio-economic, ecological and tidal variables. The thesis demonstrates that spatial regression method can be applied to better understand the transmission dynamics of BFV disease and its risk factors. The research findings show that disease notification data can be integrated with multi-factorial risk factor data to develop build-up models and forecast future potential disease risks under climate change scenarios. This thesis may have implications in BFV disease control and prevention programs in Queensland.
Resumo:
Regenerative medicine-based approaches for the repair of damaged cartilage rely on the ability to propagate cells while promoting their chondrogenic potential. Thus, conditions for cell expansion should be optimized through careful environmental control. Appropriate oxygen tension and cell expansion substrates and controllable bioreactor systems are probably critical for expansion and subsequent tissue formation during chondrogenic differentiation. We therefore evaluated the effects of oxygen and microcarrier culture on the expansion and subsequent differentiation of human osteoarthritic chondrocytes. Freshly isolated chondrocytes were expanded on tissue culture plastic or CultiSpher-G microcarriers under hypoxic or normoxic conditions (5% or 20% oxygen partial pressure, respectively) followed by cell phenotype analysis with flow cytometry. Cells were redifferentiated in micromass pellet cultures over 4 weeks, under either hypoxia or normoxia. Chondrocytes cultured on tissue culture plastic proliferated faster, expressed higher levels of cell surface markers CD44 and CD105 and demonstrated stronger staining for proteoglycans and collagen type II in pellet cultures compared with microcarrier-cultivated cells. Pellet wet weight, glycosaminoglycan content and expression of chondrogenic genes were significantly increased in cells differentiated under hypoxia. Hypoxia-inducible factor-3alpha mRNA was up-regulated in these cultures in response to low oxygen tension. These data confirm the beneficial influence of reduced oxygen on ex vivo chondrogenesis. However, hypoxia during cell expansion and microcarrier bioreactor culture does not enhance intrinsic chondrogenic potential. Further improvements in cell culture conditions are therefore required before chondrocytes from osteoarthritic and aged patients can become a useful cell source for cartilage regeneration.
Resumo:
Hematopoietic stem cell (HSC) transplant is a well established curative therapy for some hematological malignancies. However, achieving adequate supply of HSC from some donor tissues can limit both its application and ultimate efficacy. The theory that this limitation could be overcome by expanding the HSC population before transplantation has motivated numerous laboratories to develop ex vivo expansion processes. Pioneering work in this field utilized stromal cells as support cells in cocultures with HSC to mimic the HSC niche. We hypothesized that through translation of this classic coculture system to a three-dimensional (3D) structure we could better replicate the niche environment and in turn enhance HSC expansion. Herein we describe a novel high-throughput 3D coculture system where murine-derived HSC can be cocultured with mesenchymal stem/stromal cells (MSC) in 3D microaggregates—which we term “micromarrows.” Micromarrows were formed using surface modified microwells and their ability to support HSC expansion was compared to classic two-dimensional (2D) cocultures. While both 2D and 3D systems provide only a modest total cell expansion in the minimally supplemented medium, the micromarrow system supported the expansion of approximately twice as many HSC candidates as the 2D controls. Histology revealed that at day 7, the majority of bound hematopoietic cells reside in the outer layers of the aggregate. Quantitative polymerase chain reaction demonstrates that MSC maintained in 3D aggregates express significantly higher levels of key hematopoietic niche factors relative to their 2D equivalents. Thus, we propose that the micromarrow platform represents a promising first step toward a high-throughput HSC 3D coculture system that may enable in vitro HSC niche recapitulation and subsequent extensive in vitro HSC self-renewal.
Resumo:
Bomb technicians perform their work while encapsulated in explosive ordnance disposal (EOD) suits. Designed primarily for safety, these suits have an unintended consequence of impairing the body’s natural mechanisms for heat dissipation. Purpose: To quantify the heat strain encountered during an EOD operational scenario in the tropical north of Australia. Methods: All active police male bomb technicians, located in a tropical region of Australia (n=4, experience 7 ± 2.1 yrs, age 34 ± 2 yrs, height 182.3 ± 5.4 cm, body mass 95 ± 4 kg, VO2max 46 ± 5.7 ml.kg-1.min-1) undertook an operational scenario wearing the Med-Eng EOD 9 suit and helmet (~32 kg). The climatic conditions ranged between 27.1–31.8°C ambient temperature, 66-88% relative humidity, and 30.7-34.3°C wet bulb globe temperature. The scenario involved searching a two story non air-conditioned building for a target; carrying and positioning equipment for taking an X-ray; carrying and positioning equipment to disrupt the target; and finally clearing the site. Core temperature and heart rate were continuously monitored, and were used to calculate a physiological strain index (PSI). Urine specific gravity (USG) assessed hydration status and heat associated symptomology were also recorded. Results: The scenario was completed in 121 ± 22 mins (23.4 ± 0.4% work, 76.5 ± 0.4% rest/recovery). Maximum core temperature (38.4 ± 0.2°C), heart rate (173 ± 5.4 bpm, 94 ± 3.3% max), PSI (7.1 ± 0.4) and USG (1.031 ± 0.002) were all elevated after the simulated operation. Heat associated symptomology highlighted that moderate-severe levels of fatigue and thirst were universally experienced, muscle weakness and heat sensations experienced by 75%, and one bomb technician reported confusion and light-headedness. Conclusion: All bomb technicians demonstrated moderate-high levels of heat strain, evidenced by elevated heart rate, core body temperature and PSI. Severe levels of dehydration and noteworthy heat-related symptoms further highlight the risks to health and safety faced by bomb technicians operating in tropical locations.
Resumo:
Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.
Resumo:
In his 2007 PESA keynote address, Paul Smeyers discussed the increasing regulation of child-rearing through government intervention and the generation of “experts,” citing particular examples from Europe where cases of childhood obesity and parental neglect have stirred public opinion and political debate. In his paper (this issue), Smeyers touches on a number of tensions before concluding that child rearing qualifies as a practice in which liberal governments should be reluctant to intervene. In response, I draw on recent experiences in Australia and argue that certain tragic events of late are the result of an ethical, moral and social vacuum in which these tensions coalesce. While I agree with Smeyers that governments should be reluctant to “intervene” in the private domain of the family, I argue that there is a difference between intervention and support. In concluding, I maintain that if certain Western liberal democracies did a more comprehensive job of supporting children and their families through active social investment in primary school education, then both families and schools would be better equipped to deal with the challenges they now face.
Resumo:
Attention Deficit Hyperactivity Disorder is a diagnostic term now indelibly scored on the public psyche. In some quarters, a diagnosis of “ADHD” is regarded with derision. In others it is welcomed with relief. Despite intense multi-disciplinary research, the jury is still out with regards to the “truth” of ADHD. Not surprisingly, the rapid increase in diagnosis over the past fifteen years, coupled with an exponential rise in the prescription of restricted class psychopharmaceuticals has stirred virulent debate. Provoking the most interest, it seems, are questions regarding causality. Typically, these revolve around possible antecedents for “disorderly” behaviour – bad food, bad tv and bad parents. Very seldom is the institution of schooling ever in the line of sight. To investigate this gap, I draw on Foucault to question what might be happening in schools and how this may be contributing to the definition, recognition and classification of particular children as a particular kind of “disorderly”.
Resumo:
This study examined emotional climate in relation to the teaching and learning of grade 7 science. A multi-method and multi-theoretic approach used sociocultural frameworks as a foundation for interpretive research, conversation analysis, prosody analysis, and studies of nonverbal conduct. Emotional climate varied continuously throughout a lesson. Dialogues occurred and afforded learning when interactions between the teacher and students were fluent and included humour and collective effervescence. Emotional climate was negatively valenced when the teacher and/or students endeavoured to establish and maintain power by restricting others’ participation to spectator roles. The teacher’s endeavours to maintain and establish control over students were potentially detrimental to teaching and learning, teachers and learners. This type of teaching gradually evolved into a form we referred to as cranky teaching, whereby the teacher and her students showed signs of frustration and the enacted teaching and learning roles lacked fluency. The methods we pioneered in the present study might be helpful for other teachers who wish to participate in research on their classes to ascertain what works and should be strengthened, and identify practices and rituals that are deleterious and in need of change.
Resumo:
Railroad corridors contain large number of Insulated Rail Joints (IRJs) that act as safety critical elements in the circuitries of the signaling and broken rail identification systems. IRJs are regarded as sources of excitation for the passage of loaded wheels leading to high impact forces; these forces in turn cause dips, cross levels and twists to the railroad geometry in close proximity to the sections containing the IRJs in addition to the local damages to the railhead of the IRJs. Therefore, a systematic monitoring of the IRJs in railroad is prudent to mitigate potential risk of their sudden failure (e.g., broken tie plates) under the traffic. This paper presents a simple method of periodic recording of images using time-lapse photography and total station surveying measurements to understand the ongoing deterioration of the IRJs and their surroundings. Over a 500 day period, data were collected to examine the trends in narrowing of the joint gap due to plastic deformation the railhead edges and the dips, cross levels and twists caused to the railroad geometry due to the settlement of ties (sleepers) around the IRJs. The results reflect that the average progressive settlement beneath the IRJs is larger than that under the continuously welded rail, which leads to excessive deviation of railroad profile, cross levels and twists.
Resumo:
Cold water immersion (CWI) is a popular recovery modality, but actual physiological responses to CWI after exercise in the heat have not been well documented. The purpose of this study was to examine effects of 20-min CWI (14 degrees C) on neuromuscular function, rectal (T(re)) and skin temperature (T(sk)), and femoral venous diameter after exercise in the heat. Ten well-trained male cyclists completed two bouts of exercise consisting of 90-min cycling at a constant power output (216+/-12W) followed by a 16.1km time trial (TT) in the heat (32 degrees C). Twenty-five minutes post-TT, participants were assigned to either CWI or control (CON) recovery conditions in a counterbalanced order. T(re) and T(sk) were recorded continuously, and maximal voluntary isometric contraction torque of the knee extensors (MVIC), MVIC with superimposed electrical stimulation (SMVIC), and femoral venous diameters were measured prior to exercise, 0, 45, and 90min post-TT. T(re) was significantly lower in CWI beginning 50min post-TT compared with CON, and T(sk) was significantly lower in CWI beginning 25min post-TT compared with CON. Decreases in MVIC, and SMVIC torque after the TT were significantly greater for CWI compared with CON; differences persisted 90min post-TT. Femoral vein diameter was approximately 9% smaller for CWI compared with CON at 45min post-TT. These results suggest that CWI decreases T(re), but has a negative effect on neuromuscular function.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
This thesis aims to contribute to a better understanding of how serious games/games for change function as learning frameworks for transformative learning in an educational setting. This study illustrates how the meaning-making processes and learning with and through computer gameplay are highly contingent, and are significantly influenced by the uncertainties of the situational context. The study focuses on SCAPE, a simulation game that addresses urban planning and sustainability. SCAPE is based on the real-world scenario of Kelvin Grove Urban Village, an inner city redevelopment area in Brisbane, Queensland, Australia. The game is embedded within an educational program, and I thus account for the various gameplay experiences of different school classes participating in this program. The networks emerging from the interactions between students/players, educators, facilitators, the technology, the researcher, as well as the setting, result in unanticipated, controversial, and sometimes unintended gameplay experiences and outcomes. To unpack play, transformative learning and games, this study adopts an ecological approach that considers the magic circle of gameplay in its wider context. Using Actor-Network Theory as the ontological lens for inquiry, the methods for investigation include an extensive literature review, ethnographic participant observation of SCAPE, as well as student and teacher questionnaires, finishing with interviews with the designers and facilitators of SCAPE. Altogether, these methods address my research aim to better understand how the heterogeneous actors engage in the relationships in and around gameplay, and illustrate how their conflicting understandings enable, shape or constrain the (transformative) learning experience. To disentangle these complexities, my focus continuously shifts between the following modes of inquiry into the aims „h To describe and analyse the game as a designed artefact. „h To examine the gameplay experiences of players/students and account for how these experiences are constituted in the relationships of the network. „h To trace the meaning-making processes emerging from the various relations of players/students, facilitators, teachers, designers, technology, researcher, and setting, and consider how the boundaries of the respective ecology are configured and negotiated. „h To draw out the implications for the wider research area of game-based learning by using the simulation game SCAPE as an example for introducing gameplay to educational settings. Accounting in detail for five school classes, these accounts represent, each in its own right, distinct and sometimes controversial forms of engagement in gameplay. The practices and negotiations of all the assembled human and non-human actors highlight the contingent nature of gameplay and learning. In their sum, they offer distinct but by no means exhaustive examples of the various relationships that emerge from the different assemblages of human and non-human actors. This thesis, hence, illustrates that game-based learning in an educational setting is accompanied by considerable unpredictability and uncertainty. As ordinary life spills and leaks into gameplay experiences, group dynamics and the negotiations of technology, I argue that overly deterministic assertions of the game¡¦s intention, as well as a too narrowly defined understanding of the transformative learning outcome, can constrain our inquiries and hinder efforts to further elucidate and understand the evolving uncertainties around game-based learning. Instead, this thesis posits that playing and transformative learning are relational effects of the respective ecology, where all actors are networked in their (partial) enrolment in the process of translation. This study thus attempts to foreground the rich opportunities for exploring how game-based learning is assembled as a network of practices.
Resumo:
Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.